oracle communications eagle · the commands manual provides a description of all commands used in...

2983
Oracle ® Communications EAGLE Commands Release 45.0 910-6667-001 Revision C February 2014

Upload: others

Post on 15-Mar-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

  • Oracle® CommunicationsEAGLECommands

    Release 45.0

    910-6667-001 Revision C

    February 2014

  • Oracle® Communications Commands, Release 45.0Copyright © 1993, 2014, Oracle and/or its affiliates. All rights reserved.

    This software and related documentation are provided under a license agreement containing restrictionson use and disclosure and are protected by intellectual property laws. Except as expressly permitted in yourlicense agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverseengineering, disassembly, or decompilation of this software, unless required by law for interoperability, isprohibited.

    The information contained herein is subject to change without notice and is not warranted to be error-free.If you find any errors, please report them to us in writing.

    If this is software or related documentation that is delivered to the U.S. Government or anyone licensing iton behalf of the U.S. Government, the following notice is applicable:

    U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technicaldata delivered to U.S. Government customers are "commercial computer software" or "commercial technicaldata" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations.As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictionsand license terms set forth in the applicable Government contract, and, to the extent applicable by the termsof the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer SoftwareLicense (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.

    This software or hardware is developed for general use in a variety of information management applications.It is not developed or intended for use in any inherently dangerous applications, including applicationsthat may create a risk of personal injury. If you use this software or hardware in dangerous applications,then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures toensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused byuse of this software or hardware in dangerous applications.

    Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarksof their respective owners.

    Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarksare used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD,Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of AdvancedMicro Devices. UNIX is a registered trademark of The Open Group.

    This software or hardware and documentation may provide access to or information on content, products,and services from third parties. Oracle Corporation and its affiliates are not responsible for and expresslydisclaim all warranties of any kind with respect to third-party content, products, and services. OracleCorporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to youraccess to or use of third-party content, products, or services.

  • Table of Contents

    Chapter 1: Introduction.................................................................................9Overview ..............................................................................................................................................10Scope and Audience ...........................................................................................................................10Manual Organization ..........................................................................................................................10Documentation Admonishments.......................................................................................................11Customer Care Center.........................................................................................................................11Emergency Response...........................................................................................................................13Related Publications............................................................................................................................14Documentation Availability, Packaging, and Updates..................................................................14Locate Product Documentation on the Customer Support Site....................................................15

    Chapter 2: Using Commands.....................................................................16Maintenance and Administration Subsystem .................................................................................17E5-based Control Cards ......................................................................................................................17Input/Output Devices ........................................................................................................................18About Commands ...............................................................................................................................24

    Log into the System for a User Session ................................................................................35Your User ID and Password were not Accepted ................................................................36You Must Change Your Password .......................................................................................36Your Password has Expired ..................................................................................................37Your User ID is Already Being Used ....................................................................................38Log Out Of the System............................................................................................................38

    Chapter 3: Alphabetical List of Commands............................................39Alphabetical List of Commands........................................................................................................40

    Chapter 4: Commands.................................................................................60

    Chapter 5: Debug Commands...............................................................2676

    Chapter 6: Pass-Through Commands...................................................2769

    iii910-6667-001 Revision C, February 2014

  • Appendix A: Reference Information....................................................2923Summary of Range Values for :link Parameter...........................................................................2924Commands Listed by Class............................................................................................................2925

    Basic Commands..................................................................................................................2925Database Administration Commands...............................................................................2925System Maintenance Commands.......................................................................................2934Link Maintenance Commands...........................................................................................2936Program Update Commands.............................................................................................2937Security Administration Commands................................................................................2937Debug Commands...............................................................................................................2937Pass-Through Commands...................................................................................................2938

    Possible Values for PST/SST/AST ...............................................................................................2939PST .........................................................................................................................................2939SST .........................................................................................................................................2939AST.........................................................................................................................................2941

    Point Code Formats and Conversion............................................................................................2942ANSI Point Codes................................................................................................................2943ITU International Point Codes...........................................................................................2944ITU National Point Codes...................................................................................................2944Converting ITU National Point Code Formats................................................................2945

    Valid CIC Ranges for SI and MSU Types in Routing Key Static Entries.................................2949DRANAIV/DRANAI Mapping.....................................................................................................2950DRANPV/DRANP Mapping.........................................................................................................2950NAIV/NAI Mapping.......................................................................................................................2951NPV/NP Mapping...........................................................................................................................2951Cards that use the ent-card Command.........................................................................................2952Summary of Loopback Testing Commands and Functions.......................................................2955

    Appendix B: Acronyms and Abbreviations........................................2962Acronyms and Abbreviations........................................................................................................2963

    iv910-6667-001 Revision C, February 2014

  • List of Figures

    Figure 1: System Terminal User Display......................................................................................................19

    Figure 2: Telnet Terminal Selection and Login ...........................................................................................22

    Figure 3: Output Banner Format....................................................................................................................31

    Figure 4: Eagle Input and Internal Clocks with TDM-GTI......................................................................179

    Figure 5: chg-db:action=backup:dest=fixed...............................................................................................202

    Figure 6: chg-db:action=restore:src=fixed..................................................................................................202

    Figure 7: chg-db:action=backup:dest=remove..........................................................................................204

    Figure 8: Remote Backup or Restore ..........................................................................................................204

    Figure 9: chg-db:action=repair.....................................................................................................................204

    Figure 10: chg-db:action=restore:src=remove............................................................................................205

    Figure 11: Prefix Table References...............................................................................................................593

    Figure 12: ATM Loopback Tests ...............................................................................................................2961

    v910-6667-001 Revision C, February 2014

  • List of Tables

    Table 1: Admonishments................................................................................................................................11

    Table 2: Action Commands and Associated System Entity.......................................................................25

    Table 3: Keyboard Functions..........................................................................................................................26

    Table 4: Unsolicited Output Message Groups.............................................................................................30

    Table 5: TRIGTYPE Parameter Values........................................................................................................135

    Table 6: Valid Parameter Combinations for chg-appl-rtkey Routing Key Types.................................142

    Table 7: Maximum IP Associations and Links...........................................................................................153

    Table 8: Validation Rules for Association Establishment.........................................................................154

    Table 9: Alias Combination Matrix..............................................................................................................220

    Table 10: EIR Response Type Values...........................................................................................................266

    Table 11: Valid Parameter Combinations for chg-gtt Routing Parameters...........................................335

    Table 12: Gateway Screening Stop Action Definitions.............................................................................363

    Table 13: Default Subnet Mask Values .......................................................................................................391

    Table 14: slsocbit example (chg-ls)...............................................................................................................472

    Table 15: NI Mapping Rules.........................................................................................................................488

    Table 16: Incoming SLS Bit Rotation for ANSI Linksets...........................................................................489

    Table 17: Supported chg-scr-sio Parameter Combinations......................................................................708

    Table 18: NPCFMTI Parameter - ITU National Point Code Values........................................................783

    Table 19: Point Code Format Examples......................................................................................................783

    Table 20: TON2NAI Mapping Default Values ..........................................................................................853

    Table 21: NAI2TON Mapping Default Values .........................................................................................854

    Table 22: Valid and Default UAPS Parameter Values..............................................................................855

    vi910-6667-001 Revision C, February 2014

  • Table 23: Minimum Hardware Required for LNP Quantity Features.................................................1112

    Table 24: TPS Capacities..............................................................................................................................1115

    Table 25: TRIGTYPE Hexadecimal Codes................................................................................................1156

    Table 26: Valid ent-gtt Routing Parameter Combinations.....................................................................1249

    Table 27: Incoming SLS Bit Rotation for ITU...........................................................................................1308

    Table 28: Incoming SLS Bit Rotation for ANSI........................................................................................1308

    Table 29: SLSOCBIT example (ent-ls)........................................................................................................1315

    Table 30: SLS Bit Rotation...........................................................................................................................1315

    Table 31: Additional Valid ent-scr-sio Parameter Combinations..........................................................1441

    Table 32: DMS.CFG File Location for format-disk Command..............................................................1517

    Table 33: Disk Format Capacity.................................................................................................................1517

    Table 34: Route Set Test When LNP is Offline ........................................................................................1534

    Table 35: Receiving Messages when LNP is Offline .............................................................................1535

    Table 36: rept-ftp-meas Valid Parameter Combinations........................................................................1576

    Table 37: rept-imt-info Statistics, Low Speed Summary (rept-imt-info:report=(hmuxerr, hiprerr,or hipr2err)) ............................................................................................................................................1582

    Table 38: rept-imt-info Statistics, High Speed Summary ......................................................................1586

    Table 39: rept-imt-info Statistics, Miscellaneous Summary ..................................................................1596

    Table 40: Hexadecimal/Decimal Values for s and e Parameters..........................................................1613

    Table 41: Level 1 IMT Statistics..................................................................................................................1618

    Table 42: Level 1 IMT Statistics, High Speed Error Summary...............................................................1628

    Table 43: Valid Parameter Combinations for the type Parameter........................................................1652

    Table 44: Maximum Supported Links based on Card Type and GPL..................................................1675

    Table 45: Auto-Inhibit Hardware Verification Codes.............................................................................1705

    Table 46: IMT Bus States..............................................................................................................................1781

    vii910-6667-001 Revision C, February 2014

  • Table 47: Baseline Configuration Changes for the E5-ENET-B Card...................................................1786

    Table 48: Retrieve Commands for Additional Table Information .......................................................2548

    Table 49: Time Zones Set by the set-time Command..............................................................................2604

    Table 50: Test Disk Execution Times.........................................................................................................2612

    Table 51: Subrange Parameters for cmd Keywords................................................................................2685

    Table 52: Summary of Ranges for link Parameter...................................................................................2924

    Table 53: Commands that support the Spare Point Code Prefix...........................................................2948

    Table 54: Commands that support the Private Point Code Prefix........................................................2949

    Table 55: Valid CIC Ranges for SI and MSU Types................................................................................2950

    Table 56: DRANAIV/DRANAI Mapping................................................................................................2950

    Table 57: DRANPV/DRANP Mapping....................................................................................................2950

    Table 58: NAIV/NAI Mapping..................................................................................................................2951

    Table 59: NPV/NP Mapping......................................................................................................................2951

    Table 60: Valid Card Applications and Types.........................................................................................2952

    Table 61: Loopback Testing Commands and Functions.........................................................................2956

    viii910-6667-001 Revision C, February 2014

  • Chapter

    1Introduction

    This chapter contains a brief description of theCommands Manual. The contents include sections

    Topics:

    • Overview .....10 about the manual scope, audience, and organization;• Scope and Audience .....10 how to find related publications; and how to contact

    Tekelec for assistance.• Manual Organization .....10• Documentation Admonishments.....11• Customer Care Center.....11• Emergency Response.....13• Related Publications.....14• Documentation Availability, Packaging, and

    Updates.....14• Locate Product Documentation on the Customer

    Support Site.....15

    9910-6667-001 Revision C, February 2014

  • Overview The Commands Manual provides a description of all commands used in the EAGLE 5 IntegratedSignaling System (ISS) and LNP. The EAGLE 5 ISS includes the IP

    7 Secure Gateway and the IP

    7 Front

    End. The use of the term "the system" indicates that the information is common to all of the functionsof the EAGLE 5 ISS. Differences are indicated for the specific product, as appropriate.

    Note: The IP7 Front End configuration is a stand-alone single-shelf IP

    7 Secure Gateway. When using

    this manual, consider IP7 Front End and IP

    7 Secure Gateway as functional equivalents with the IP

    7

    Front End limited to a single shelf configuration.

    Commands are entered at a terminal to perform system operations such as displaying the systemstatus, administering system security, and maintaining the database. Error messages are displayed toprovide information about problems encountered when a command is entered.

    Scope and Audience This manual is intended for those who maintain and do database administration on the TekelecSignaling Products and LNP. It is assumed that the user is familiar with the SS7 network and itsassociated protocols. The manual describes commands used in the system, and it contains a specialsection on debug commands and their descriptions.

    Debug commands are a special group of commands used in troubleshooting and debugging the system.These commands are intended for Customer Care Center personnel and authorized engineeringpersonnel in the operating companies. The use of these commands is restricted to those personnelwho have access to the “Debug” command class.

    Manual Organization This document is organized into the following chapters:

    • Introduction contains general information about the Commands Manual, the organization of themanual and how to get technical assistance.

    • Using Commands describes the system's Maintenance and Administration subsystem andinput/output devices. This chapter also provides the method for entering commands and logginginto and out of the system.

    • Alphabetical List of Commands contains an alphabetical list of the Tekelec Signaling Products (Eagle,STP, IP

    7 Secure Gateway, and IP

    7 Front End) commands.

    • Commands describes all commands that are not pass-through or debug commands.• Debug Commands describes all debug commands.• Pass-Through Commands describes all pass-through commands.• Reference Information contains general information that is used by multiple commands, including

    point code format and conversion information, mapping tables, lists of commands by class, andloopbcck information.

    • Acronyms and Abbreviationscontains all acronyms and abbreviations used in the Commands Manual.

    Note: Throughout this manual, reference to the OAP (Operation System Support Application Processor)applies also to the EOAP (Enhanced Operation System Support Application Process).

    10910-6667-001 Revision C, February 2014

    IntroductionManual Organization

  • Documentation AdmonishmentsAdmonishments are icons and text throughout this manual that alert the reader to assure personalsafety, to minimize possible service interruptions, and to warn of the potential for equipment damage.

    Table 1: Admonishments

    DescriptionIcon

    Danger:

    (This icon and text indicate the possibility ofpersonal injury.)

    Warning:

    (This icon and text indicate the possibility ofequipment damage.)

    Caution:

    (This icon and text indicate the possibility ofservice interruption.)

    Topple:

    (This icon and text indicate the possibility ofpersonal injury and equipment damage.)

    Customer Care CenterThe Tekelec Customer Care Center is your initial point of contact for all product support needs. Arepresentative takes your call or email, creates a Customer Service Request (CSR) and directs yourrequests to the Tekelec Technical Assistance Center (TAC). Each CSR includes an individual trackingnumber. Together with TAC Engineers, the representative will help you resolve your request.

    The Customer Care Center is available 24 hours a day, 7 days a week, 365 days a year, and is linkedto TAC Engineers around the globe.

    Tekelec TAC Engineers are available to provide solutions to your technical questions and issues 7days a week, 24 hours a day. After a CSR is issued, the TAC Engineer determines the classification ofthe trouble. If a critical problem exists, emergency procedures are initiated. If the problem is not critical,normal support procedures apply. A primary Technical Engineer is assigned to work on the CSR andprovide a solution to the problem. The CSR is closed when the problem is resolved.

    Tekelec Technical Assistance Centers are located around the globe in the following locations:

    Tekelec - GlobalEmail (All Regions): [email protected]

    11910-6667-001 Revision C, February 2014

    IntroductionTekelec - Global

  • • USA and Canada

    Phone:

    1-888-367-8552 (toll-free, within continental USA and Canada)

    1-919-460-2150 (outside continental USA and Canada)

    TAC Regional Support Office Hours:

    8:00 a.m. through 5:00 p.m. (GMT minus 5 hours), Monday through Friday, excluding holidays

    • Caribbean and Latin America (CALA)

    Phone:

    +1-919-460-2150

    TAC Regional Support Office Hours (except Brazil):

    10:00 a.m. through 7:00 p.m. (GMT minus 6 hours), Monday through Friday, excluding holidays

    • Argentina

    Phone:

    0-800-555-5246 (toll-free)

    • Brazil

    Phone:

    0-800-891-4341 (toll-free)

    TAC Regional Support Office Hours:

    8:00 a.m. through 5:48 p.m. (GMT minus 3 hours), Monday through Friday, excluding holidays

    • Chile

    Phone:

    1230-020-555-5468

    • Colombia

    Phone:

    01-800-912-0537

    • Dominican Republic

    Phone:

    1-888-367-8552

    • Mexico

    Phone:

    001-888-367-8552

    • Peru

    Phone:

    0800-53-087

    12910-6667-001 Revision C, February 2014

    IntroductionTekelec - Global

  • • Puerto Rico

    Phone:

    1-888-367-8552

    • Venezuela

    Phone:

    0800-176-6497

    • Europe, Middle East, and Africa

    Regional Office Hours:

    8:30 a.m. through 5:00 p.m. (GMT), Monday through Friday, excluding holidays

    • Signaling

    Phone:

    +44 1784 467 804 (within UK)

    • Software Solutions

    Phone:

    +33 3 89 33 54 00

    • Asia

    • India

    Phone:

    +91-124-465-5098 or +1-919-460-2150

    TAC Regional Support Office Hours:

    10:00 a.m. through 7:00 p.m. (GMT plus 5 1/2 hours), Monday through Saturday, excludingholidays

    • Singapore

    Phone:

    +65 6796 2288

    TAC Regional Support Office Hours:

    9:00 a.m. through 6:00 p.m. (GMT plus 8 hours), Monday through Friday, excluding holidays

    Emergency ResponseIn the event of a critical service situation, emergency response is offered by the Tekelec Customer CareCenter 24 hours a day, 7 days a week. The emergency response provides immediate coverage, automaticescalation, and other features to ensure that the critical situation is resolved as rapidly as possible.

    13910-6667-001 Revision C, February 2014

    IntroductionEmergency Response

  • A critical situation is defined as a problem with the installed equipment that severely affects service,traffic, or maintenance capabilities, and requires immediate corrective action. Critical situations affectservice and/or system operation resulting in one or several of these situations:

    • A total system failure that results in loss of all transaction processing capability• Significant reduction in system capacity or traffic handling capability• Loss of the system’s ability to perform automatic system reconfiguration• Inability to restart a processor or the system• Corruption of system databases that requires service affecting corrective actions• Loss of access for maintenance or recovery operations• Loss of the system ability to provide any required critical or major trouble notification

    Any other problem severely affecting service, capacity/traffic, billing, and maintenance capabilitiesmay be defined as critical by prior discussion and agreement with the Tekelec Customer Care Center.

    Related PublicationsFor information about additional publications that are related to this document, refer to the RelatedPublications document. The Related Publications document is published as a part of the ReleaseDocumentation and is also published as a separate document on the Tekelec Customer Support Site.

    Documentation Availability, Packaging, and UpdatesTekelec provides documentation with each system and in accordance with contractual agreements.For General Availability (GA) releases, Tekelec publishes a complete EAGLE 5 ISS documentation set.For Limited Availability (LA) releases, Tekelec may publish a documentation subset tailored to specificfeature content or hardware requirements. Documentation Bulletins announce a new or updatedrelease.

    The Tekelec EAGLE 5 ISS documentation set is released on an optical disc. This format allows for easysearches through all parts of the documentation set.

    The electronic file of each manual is also available from the Tekelec Customer Support site. This siteallows for 24-hour access to the most up-to-date documentation, including the latest versions of FeatureNotices.

    Printed documentation is available for GA releases on request only and with a lead time of six weeks.The printed documentation set includes pocket guides for commands and alarms. Pocket guides mayalso be ordered separately. Exceptions to printed documentation are:

    • Hardware or Installation manuals are printed without the linked attachments found in the electronicversion of the manuals.

    • The Release Notice is available only on the Customer Support site.

    Note: Customers may print a reasonable number of each manual for their own use.

    Documentation is updated when significant changes are made that affect system operation. Updatesresulting from Severity 1 and 2 Problem Reports (PRs) are made to existing manuals. Other changesare included in the documentation for the next scheduled release. Updates are made by re-issuing anelectronic file to the customer support site. Customers with printed documentation should contacttheir Sales Representative for an addendum. Occasionally, changes are communicated first with aDocumentation Bulletin to provide customers with an advanced notice of the issue until officially

    14910-6667-001 Revision C, February 2014

    IntroductionDocumentation Availability, Packaging, and Updates

    https://secure.tekelec.com/OA_HTML/ibuhpage.jsp

  • released in the documentation. Documentation Bulletins are posted on the Customer Support site andcan be viewed per product and release.

    Locate Product Documentation on the Customer Support SiteAccess to Tekelec's Customer Support site is restricted to current Tekelec customers only. This sectiondescribes how to log into the Tekelec Customer Support site and locate a document. Viewing thedocument requires Adobe Acrobat Reader, which can be downloaded at www.adobe.com.

    1. Log into the Tekelec Customer Support site.

    Note: If you have not registered for this new site, click the Register Here link. Have your customernumber available. The response time for registration requests is 24 to 48 hours.

    2. Click the Product Support tab.3. Use the Search field to locate a document by its part number, release number, document name, or

    document type. The Search field accepts both full and partial entries.4. Click a subject folder to browse through a list of related files.5. To download a file to your location, right-click the file name and select Save Target As.

    15910-6667-001 Revision C, February 2014

    IntroductionLocate Product Documentation on the CustomerSupport Site

    https://secure.tekelec.com/OA_HTML/ibuhpage.jsp

  • Chapter

    2Using Commands

    This chapter provides the following information:Topics:

    • A description of the system’s Maintenance andAdministration Subsystem

    • Maintenance and Administration Subsystem ...17• E5-based Control Cards .....17

    • A description of the system’s input and outputdevices• Input/Output Devices .....18

    • About Commands .....24 • A description of how to enter commands• The procedures for logging into and out of the

    system

    This chapter is intended to assist personnelresponsible for the system.

    16910-6667-001 Revision C, February 2014

  • Maintenance and Administration Subsystem The Maintenance and Administration Subsystem (MAS) is the central management point for theEAGLE 5 ISS.

    The MAS provides user interface, maintenance communication, peripheral services, alarm processing,system disk interface, and measurements.

    Management and redundancy is provided by use of two separate subsystem processors.

    The MAS resides on two separate sets of Maintenance and Administration Subsystem Processor(MASP) cards and a Maintenance Disk and Alarm card (collectively referred to as control cards). Thecontrol cards are located in slots 1113 through 1118 of the EAGLE 5 ISS Control Shelf.

    E5-based Control Cards The E5-based set of EAGLE 5 ISS control cards consists of the following cards:

    • Two Maintenance and Administration Subsystem Processor cards (E5-MASP cards). Each dual-slotE5-MASP card is made up of two modules:

    • Maintenance Communication Application Processor (E5-MCAP) card• Terminal Disk Module (E5-TDM) card

    • One Maintenance Disk and Alarm card (E5-MDAL card)

    Maintenance Communication Application Processor (E5-MCAP) Card

    The E5-MCAP card contains the Communications Processor and Applications Processor and providesconnections to the IMT bus. The card controls the maintenance and database administration activityand performs both application and communication processing. E5-MCAP cards are located in slots1113 and 1115 of the control shelf.

    Each E5-MCAP card contains one latched USB port for use with removable flash media (“thumbdrive”), and one flush-mounted USB port for use with a plug-in “credit card” flash drive. The removablemedia drive is used to install and back up customer data. The credit card drive is used for upgradeand could be used for disaster recovery.

    Terminal Disk Module (E5-TDM) CardThe E5-TDM card provides the Terminal Processor for the 16 I/O ports, and interfaces to theMaintenance Disk and Alarm (E5-MDAL) card and fixed disk storage. The E5-TDM card also distributesComposite Clocks and High Speed Master clocks throughout the EAGLE 5 ISS, and distributes ShelfID to the EAGLE 5 ISS. Each E5-TDM card contains one fixed SATA drive that is used to store primaryand backup system databases, measurements, and Generic Program Loads (GPLs). E5-TDM cards arelocated in slots 1114 and 1116 of the control shelf.

    Maintenance Disk and Alarm (E5-MDAL) Card

    17910-6667-001 Revision C, February 2014

    Using CommandsMaintenance Disk and Alarm (E5-MDAL) Card

  • The E5-MDAL card processes alarm requests and provides fan control. There is only one E5-MDALcard in a control card set. Critical, major, and minor system alarms are provided for up to 6 individualframes. In addition to the 3 system alarms, the E5-MDAL card provides the system audible alarm.The E5-MDAL card provides control of fans on a per-frame basis, and allows for each fan relay to beset individually. The E5-MDAL card does not contain a removable cartridge drive; drives for removablemedia are located on the E5-MCAP card. The E5-MDAL card is located in slots 1117 and 1118 of thecontrol shelf.

    Input/Output Devices There are two types of Input/Output (I/O) devices: terminals and printers. All I/O devices areconnected to the system through the control shelf backplane. Each I/O device is described in termsof its function and its connection to the system. Refer to the Installation Manual - EAGLE 5 ISS forbackplane connection information.

    Terminals and PrintersThe EAGLE 5 ISS uses VT320 terminals for maintenance and database administration. The EAGLE 5ISS also can be configured to communicate with the SEAS interface (OAP). The terminals enable youto enter information into or receive information from the system. The system is capable ofcommunicating with terminals at data rates from 2400 to 19,200 baud, using the ASCII character set.

    You must configure terminals to operate with the system. You also must set printers (and modems)for hardware flow control. To do this, enable Data Terminal Ready (DTR) through your terminal’sconfiguration menu. A modem also must have DCD set on “high.” If your terminal has the auto-wrapfeature, ensure that it is disabled before using your terminal on the system.

    For information on the setup values for printers and terminals on the system, see the chg-trm command.

    Terminals provide the following capabilities:

    • cmdname input and output• Continuous alarm states• Event/Error messages

    You enter commands at the terminal to perform system operations such as displaying the systemstatus, administering system security, and maintaining the database.

    An example of a terminal screen is shown in Figure 1: System Terminal User Display. Note that the alarmstatus area is labeled either Total Alarm Status or Active Alarm Status depending on how the VT320terminal is configured. See the chg-stpopts command description for configuration information.

    Alarms are displayed in the alarm status area of the terminal screen. The alarm levels are as follows:

    • Critical – Indicates a severe, service-affecting condition has occurred and that immediate correctiveaction is needed, regardless of the time of day or the day of the week.

    • Major – Indicates a serious disruption of service or the failure of important circuits is taking place.These troubles require attention and response to restore or maintain system capability.

    • Minor – Indicates a trouble, but one that does not have a serious affect on service.• Inhibited – Indicates a device in the system with an inhibited alarm. A temporarily or permanently

    inhibited alarm does not generate unsolicited output or cause alarm indicators to be turned on.See the inh-alm command description for information on inhibited alarms.

    18910-6667-001 Revision C, February 2014

    Using CommandsTerminals and Printers

  • Event/Error messages also are issued to terminals to report system conditions or events. If the conditionor event affects service, an alarm is issued along with an Event/Error message. Event/Error messagesare displayed in the scroll area of the terminal screen.

    Figure 1: System Terminal User Display

    Use the command line region of the terminal display () to enter commands. The command line regionconsists of two lines. Each of these lines can hold up to 80 characters. If you enter a command of morethan 80 characters in length, the command appears on both lines. When you press the Enter key, onlythe first 80 characters are displayed in the previous command line, followed by a message on thecommand response line showing the status of the command. The remaining characters have not beenrejected; they are not displayed due to line length limitations. If you recall the command by pressingthe Up arrow key or Down arrow key, all the characters in the command are displayed. For a descriptionof the arrow key functions, see Table 3: Keyboard Functions.

    Printer Connections

    19910-6667-001 Revision C, February 2014

    Using CommandsPrinter Connections

  • Terminals and printers are connected to the Terminal Disk Module (TDM), using the control shelfbackplane. The TDM also provides Keyboard Send and Receive (KSR) function. A description of theTDM can be found in the Installation Manual - EAGLE 5 ISS.

    KSR Function on VT320 Terminal DevicesThe terminals can use the keyboard send and receive (KSR) mode of operation. KSR refers to a deviceor mode of operation that prints or displays all received data. The KSR mode of operation typicallysupports a teletype printer, but in the system, it also supports a video display unit and keyboard.

    The KSR feature enables you to attach a dumb terminal device or teletype printer to the system's I/Oports or emulate KSR mode of operation on a VT320. KSR enhances the system's dial-up administrationfunctions by allowing faster throughput, because the screen formatting characters associated with theVT320 mode of operation need not be transmitted.

    The tested and supported terminal size in KSR mode is 24 rows/80 columns.

    KSR ConfigurationThis feature allows you to configure the operational characteristics of system's I/O serial ports tosupport KSR terminal devices. See Table 3: Keyboard Functions for a list of the keyboard functions usedby the KSR feature. For information on configuring a serial I/O port for KSR operation, see the DatabaseAdministration Manual -SS7.

    Changing the Mode Of OperationBefore you attempt to change the mode of operation of the terminal, you must follow the “Changingthe Terminal Characteristics” procedure found in the Database Administration Manual - SS7. You mustperform this procedure from another terminal.

    You can change the mode of operation of the terminal by pressing the F11 key. The F11 key instructsthe system to mimic a KSR. cmdname line editing operates exactly like the VT320.

    The KSR emulation resembles a printer when in operation. The entire screen is used for output. Beforeyou enter a command, press . The command prompt (>) is displayed. Enter a carriage returnto signify the end of command entry.

    While in the KSR mode, all output to the video display unit is buffered. When any character is enteredfrom the terminal, a one-minute timer is started and data reception from the system is stopped. Thesystem responds to the command with the appropriate response, then resumes sending data whereit left off.

    If a carriage return is not received during command entry, a time-out occurs and the system resumessending data to the terminal.

    RequirementsThe KSR function operates on any combination of terminal type assignments for the 16 availableterminal ports.

    20910-6667-001 Revision C, February 2014

    Using CommandsRequirements

  • Telnet TerminalsTelnet is a user command using the underlying TCP/IP protocol for accessing remote computers.Telnet provides a connection from a remote (client) to a host (server) computer; the client keyboardand monitor (or window) act as if physically attached to the host computer. Remote users log on asif they were local users with whatever privileges may have been granted to the specific applicationsand data on the remote computer. Remote users, after they log in, can use the same services as a localuser.

    The IP User Interface feature permits any standard telnet client to act as an EAGLE 5 ISS terminal.This IP-based access provides a standard interface through which EAGLE 5 ISS commands are enteredfrom a telnet session to the EAGLE 5 ISS. The EAGLE 5 ISS then provides command responses backto the remote telnet terminal.

    Up to 3 E5-IPSM cards or E5-ENET-B cards running the IPS application (IPSM cards) in the EAGLE5 ISS, with IP connectivity, enable telnet clients to connect from anywhere on the customer’s IP LAN.The EAGLE 5 ISS must be on the customer’s LAN or WAN. Each IPSM card provides 8 telnet terminalports (IDs 17-24 for the first card installed, 25-32 for the second card installed, and 33-40 for the thirdcard installed), which are automatically made available when the card is installed and provisioned.See the chg-trm command description in this manual for more information about configuring telnetterminals.

    From the telnet client, the remote user connect to any one of the equipped IPSM cards available byentering the command telnet . For example,

    telnet 192.168.1.100

    The remote user then selects a terminal number from a list of available terminals. If an incorrect terminalnumber (one not listed in the prompt) is selected, the prompt appears again. (After three incorrecttries, the session is closed.) After the session is accepted, an EAGLE 5 ISS welcome message appears.At this point, broadcast messages (if provisioned) will begin to appear. See Figure 2: Telnet TerminalSelection and Login .

    21910-6667-001 Revision C, February 2014

    Using CommandsTelnet Terminals

  • Figure 2: Telnet Terminal Selection and Login

    After a connection is made, the remote user can log in using a pre-provisioned user ID and password.(The user ID and password must be provisioned from an existing serial terminal.) The login commandcan be typed directly, without typing first.

    An EAGLE 5 ISS serial terminal emulating a Keyboard Send/Receive (KSR) device is normally indisplay mode (where outgoing messages are displayed). In order to enter a command, the user mustinterrupt the display by holding down the Ctrl key and typing an “a” (the ATTENTION or Ctrl-A keysequence). When the terminal controller receives an ATTENTION, it enters a command entry mode. Theoutput text is temporarily halted, and the prompt symbol “>” appears.

    The telnet terminal enters command entry mode when any key is pressed; is not needed.

    After the login is accepted and the user presses a key to receive the standard EAGLE 5 ISS commandline prompt, all EAGLE 5 ISS commands assigned to that user ID are now accessible.

    The display of broadcast messages can be interrupted with any keystroke, and will resume after acommand is entered or a set timeout expires. When in command entry mode, the telnet server holdsany outgoing messages in a buffer while a command is entered. A command entry is completed bypressing the Enter key.

    22910-6667-001 Revision C, February 2014

    Using CommandsTelnet Terminals

  • The telnet server waits up to 60 seconds between keystrokes for the command text to be completed,before timing out and resuming the broadcast display. If the command entry times out, and outputresumes, the incomplete command text might scroll off the screen. Even though the incompletecommand was not executed, it is saved as an entry in the command buffer. This incomplete commandwill be displayed again when any key is pressed. The command string can be finished by continuingthe typing where it was interrupted. Pressing the Enter key submits this command as usual.

    Broadcast messages are held in a buffer from the time a key is pressed, until the command is complete(timed out, aborted, cancelled, or rejected). This is to allow command responses to be completelydisplayed. After the command completes, broadcast messages (if provisioned) will resume. The IPSMcard buffer will hold up to 30 minutes of broadcast output before discarding the oldest messages.

    When the user enters the logout command to end the telnet session, the user is logged off of theEAGLE 5 ISS, but the port remains assigned to the EAGLE 5 ISS telnet terminal. If the active portconnection is lost for a reason such as hardware fault or system interruption, the telnet server resetsaffected ports, the session is closed, and the user ID is logged off.

    The OA&M IP Security Enhancement feature provides secure connections to the EAGLE 5 ISS. Referto Appendix B of the Database Administration Manual - System Management for information on usingthe PuTTY client to make a secure telnet connection.

    SEAS TerminalsThe SEAS Over IP feature introduces a TCP/IP-based interface for SEAS.

    The SEAS interface constitutes the path between the EAGLE 5 ISS and a Common Channel

    Signaling Message Router (CCS MR). The EAGLE 5 ISS uses the IP User Interface feature and IPSMcards instead of EOAP to provide the paths for each SEAS TCP/IP link.

    The IPSM card allows one of the eight IP terminals to function as a SEAS terminal and provideconnectivity between the CCS MR and the EAGLE 5 ISS. The IPSM card also continues to provide theEAGLE 5 ISS with generic IP-based services, such as Telnet and FTP on the remaining seven IPterminals.

    A maximum of 2 SEAS terminals can be configured in the EAGLE 5 ISS.

    The chg-trm:type=seas command can be entered for terminals 17 - 40 when all conditions for aterminal to be set as a SEAS terminal are met.

    The SEAS output group cannot be turned off for a SEAS terminal.

    Element Management System Alarm MonitorEMSALM terminalsElement Management System Alarm Monitor (EMSALM)

    Element Management System Alarn Monitor (EMSALM) terminals display UAM alarm set and clearmessages and the UIM 1083 “system alive” messages only. No other messages (including reports andother UIMs) are displayed. EMSALM terminals are designed to display alarm messages only. EMSALMterminals are not restricted in any other way. They can accept login, and commands; however theseoperations may interfere with alarm monitoring and should be performed on an alternate terminal.

    Serial port terminal IDs 1-16 can be assigned as EMSALM terminals. These EMSALM terminals are arefinement of the KSR terminal, and contain all the KSR terminal communication parameters.

    23910-6667-001 Revision C, February 2014

    Using CommandsElement Management System Alarm Monitor

  • Telnet terminal IDs 17-40 can be assigned as EMSALM terminals when the IP User Interface featureis enabled and turned on and up to 3 IPSM cards are equipped in the system (see "Telnet Terminals"on page 4-6). These EMSALM terminals have all of the functions of a telnet type terminal.

    When the chg-trm command is entered to change a terminal to the EMSALM type, all output groupparameter values for that terminal default to YES, even if they were set to NO before the change. Eventhough an output group is set to YES for an EMSALM terminal, no reports or UIMS other than UIM1083 will appear for that output group.

    Individual output group values can be changed to NO by entering another chg-trm command foran EMSALM terminal (do this only with caution; it can cause loss of UAM alarm messages at theEMSALM terminal).

    When the chg-trm command is entered to change a terminal from type EMSALM to another type,the output group values remain unchanged. A chg-trm command can be entered to change outputgroup settings.

    About Commands Commands allow you to interact with the system to perform specific functions. Commands are availableto perform the following functions:

    • Obtain system status and operational status• Modify system configuration• Obtain measurement reports

    The following sections describe how to enter commands through a system terminal. Commandcorrection, keywords, parameters, and syntax are described.

    Entering CommandsAll commands are entered at the command prompt (>), located in the bottom window of the terminaldisplay. After entering a command, you must press the Enter key. When the command has executed(an output message appears in the display to indicate execution), \2ou can enter another command.The F9 function key allows you to interrupt a running command; however, you cannot enter anothercommand until the running command completes its operation.

    Commands are not case sensitive; therefore, either uppercase or lowercase characters can be used.Intermixing (using both upper and lower case) characters does not create an error message, but youmust use the correct command syntax.

    Action Commands Throughout this manual, the term “action command” is used in the description of some dependencies,as in the sentence “No other action command can be in progress when this command is entered.”

    Action commands are used to effect changes to the state of entities within the system, such as cardsand signaling links. For example, use the inh-card command to change the state of the card to Out-ofService - Maintenance Disabled (OOS-MT-DSBLD).

    Table 2: Action Commands and Associated System Entity lists the action commands and shows which typeof system entity they are associated with.

    24910-6667-001 Revision C, February 2014

    Using CommandsAction Commands

  • Table 2: Action Commands and Associated System Entity

    System EntityAction Commands

    Link Commandsact-slk, alw-slk, canc-slk, dact-slk, inh-slk,unhb-slk, blk-slk,ublk-slk, tst-slk

    Alarm Commandsact-alm-trns, canc-alm-trns, rls-alm

    Terminal Commandsalw-trm, inh-trm

    Card Commandsalw-card, inh-card, rmv-card, rst-card

    Command Keywords and pmeters Commands consist of two parts: keywords and parameters. Keywords identify the principal actionto be performed by the system, and consist of one to three words. Most commands also requireparameters to further define the command operation.

    pmeters are entered after the keyword. Each parameter must be separated from the keyword or theprevious parameter with a colon. If a parameter has multiple values, the values entered are discreteand must be separated with a hyphen or comma. The parameters can be entered in any order.

    Some command parameters have built-in default values that are used if a value is not specified. Toaccept a default value, press Enter after the desired keyword and parameters have been entered.

    Use the following delimiters when entering commands:

    • :separates parameters• - or , —separates multiple values within a parameter block• = —use as delimiter between the parameter and input value

    The following is an example of a command entry:

    > dact-slk:loc=1101:port=a

    The keyword in the above example is dact-slk (Deactivate Signaling Link). The first parameter forthis command is loc=1101 (the actual card location in the system for the link being cancelled, basedon equiptment location). The second parameter is port=a. This parameter signifies which signalinglink port on the card in the designated location has the link that is to be cancelled.

    If an error is made while typing commands, use the Delete key to make corrections, one character ata time.

    Note: If the same parameter is entered more than once in a command, the system accepts the lastparameter value that was entered. Any values for the parameter that were entered earlier in thecommand are ignored.

    Keyboard FunctionsSome keyboard functions used with commands are described in the previous section. Keyboardfunctions available for use with commands are listed in Table 3: Keyboard Functions. Arrow key functionsare further described following the table.

    25910-6667-001 Revision C, February 2014

    Using CommandsKeyboard Functions

  • Table 3: Keyboard Functions

    DescriptionKSR Key SequenceVT320 Key Sequence

    The Up arrow key recalls theprevious commands entered atthe prompt, one command at atime. The Up arrow key scrollsbackwards through up to 10commands for a KSR, VT320, orSCCS terminal, and up to 20commands for an IP UI telnetterminal. See page 4-13 for adescription of the Up arrow keyfunctions.

    The Left arrow key backspacesthe underline cursor withouterasing.

    The Down arrow key recalls theprevious command entered atthe prompt, one parameter at atime.

    If the Up arrow key is pressedand more than one commandhas been entered in the session,pressing the Down arrow keydisplays one previously enteredcommand at a time.The Downarrow key scrolls forwardthrough up to 10 commands forKSR, VT320, and SCCS terminalsand up to 20 commands for IPUI telnet terminals.

    See page 4-14 for a descriptionof the down arrow key functions.

    The Right arrow key recalls thelast command entered at theprompt, one character at a time.

    The F6 Function key refreshesthe terminal screen, including

    F6F6

    any characters already input onthe command line and thecommand response line.

    The F7 Function key clears thescroll buffer. This enables a user

    F7F7

    to stop useless information from

    26910-6667-001 Revision C, February 2014

    Using CommandsKeyboard Functions

  • DescriptionKSR Key SequenceVT320 Key Sequence

    passing to the scroll region of thesystem terminal.

    The F8 function key enables youto stop and restart the scrolling

    F8F8

    of information on the terminalscreen.

    The F9 Function key allows youto interrupt a running command

    F9F9

    so that you can enter anothercommand. Output andprocessing of the interruptedcommand continue. Pressing F9is the same as issuingthecanc-cmd command with noparameters.

    The commands that can beinterrupted by pressing F9 arelisted in the description of thecanc-cmd command.

    If the terminal is running one ofthe listed commands and youpressF9, output and processingare cancelled. This functionworks only on the same terminalthat is running the commandyou want to cancel. To cancel acommand from another terminal,use the canc-cmd:trm=command (see thecanc-cmdcommand description).

    The F10 Function key displayshelp information for the last

    F10F10

    command that was entered,including parameters, parameterformats, and the command class.

    The F11 Function key allows youto toggle the terminal’s mode of

    F11F11

    operation from VT320 to KSRand from KSR to VT320. Thisfunction key has no effect on IPUI telnet terminals.

    Control-A allows you to enter acommand in the KSR mode.

    Control-ANot Available

    27910-6667-001 Revision C, February 2014

    Using CommandsKeyboard Functions

  • DescriptionKSR Key SequenceVT320 Key Sequence

    Used with the sw or both flowcontrol (see the chg-trm

    Control-SControl-S

    command description for moreinformation), this key sequencesends the XOFF character totemporarily stop sending data.

    Used with the sw or both flowcontrol (see the chg-trm

    Control-QControl-Q

    command description for moreinformation), this key sequencesends the XON character toresume sending data.

    When Insert is toggled on, typedcharacters are inserted into the

    InsIns

    command line, moving existingcharacters to the right. Whentoggled off, typed charactersoverwrite existing characters.

    Deletes one character at a timefrom the right; the cursor staysin position.

    DelDel

    Deletes a character and movesthe cursor one space to the left.

    BackspaceBackspace

    Arrow Key Operation

    The arrow keys are used to move the cursor to a different position in a command, and to display partor all of a command that was previously entered.

    On KSR, VT320, and SCCS terminals, you can scroll through the last 10 commands that were enteredat the terminal during the session. On IP UI telnet terminals, you can scroll through the last 20commands that were entered at the terminal during the session. Part or all of one command at a timeis displayed. When you have scrolled through the complete list of up to 10 or 20 commands, thescrolling wraps back to the beginning of the list.

    The list of previously entered commands is cleared when a terminal is inhibited and allowed(inh-trm:trm=xx and alw-trm:trm=xx) and when a file transfer is initialized with theact-file-trns command.

    There are two modes of command recall for Up and Down arrow keys:

    • Edit Mode

    Edit Mode includes any key operation that changes the command at the prompt, such as the Deletekey, the Back Space key, or an alphanumeric key. Pressing one of these keys to enter or change acommand puts the terminal into Edit Mode. Pressing the Enter key (or carriage return) takes theterminal out of Edit Mode.

    • Non-edit Mode

    28910-6667-001 Revision C, February 2014

    Using CommandsKeyboard Functions

  • Pressing the Enter key (or carriage return) puts the terminal into Non-edit Mode. A terminal remainsin Non-edit Mode when you press an arrow key, a Function key, or the Insert key, which do notchange the command at the prompt. When you press a key that changes the command, the terminalgoes into Edit Mode until you press the Enter key again.

    Up Arrow Key

    The Up arrow key is used to recall up to the last 10 commands (KSR, VT320, and SCCS terminals) orthe last 20 commands (IP UI telnet terminals) entered at the prompt during the session.

    • In Edit Mode

    • You enter 3 characters of a command at the prompt and press the Up arrow key. If the previouscommand was 6 characters long, then the last 3 characters of the previous command are recalledand displayed after the 3 characters that you entered at the prompt.

    • You enter 10 characters of a command at the prompt and press the Up arrow key. If the previouscommand was 6 characters long, none of the previous command is displayed. The commandthat you entered remains as you entered it at the prompt.

    • Entering part or all of a command at the prompt puts the terminal into Edit Mode. In Edit Mode,the last (or previous) command is recalled only if the command length of the last command isgreater than the command at the prompt. For example:,

    • In Non-edit Mode

    • When you have pressed the Enter key and there is no command at the prompt, or you havepressed the Insert key or a Function key, the terminal is in Non-edit Mode.

    • When you press the Up arrow key in Non-edit Mode, and you have entered at least one previouscommand, the last command that you entered is displayed at the prompt. Pressing the Up arrowkey again clears the command at the prompt (if any) and displays the next previous commandthat you entered (if any). By continuing to press the Up arrow key, you can scroll backwardsthrough the last 10 commands (KSR, VT320, \2nd SCCCS terminals) or the last 20 commands(IP UI telnet terminals) that you entered at the terminal. The display wraps back to the mostrecent of the entered commands when all of the available commands have been recalled. Theterminal remains in Non-edit Mode until you press a key that changes the displayed command.

    Down Arrow Key

    In Edit Mode, the Down arrow key recalls the last command that was entered at the terminal, oneparameter at a time. The recalled parameter is displayed at the end of the entry that currently appearsat the prompt.

    In Non-edit Mode:

    • If the Up arrow has not been pressed just before pressing the Down arrow key, \2he Down arrowkey recalls the last command that was entered at the terminal, one parameter at a time.

    • If the Up arrow key is the last key that was pressed before the Down arrow key is pressed, theDown arrow key scrolls forward through the last 10 commands (KSR, VT320, \2nd SCCS terminals)or last 20 commands (IP UI telnet terminals), displaying one complete command each time the keyis pressed. The scrolling wraps to the beginning of the list when all of the available commandshave been displayed.

    Right Arrow Key

    Each time the Right arrow key is pressed, one character of the last command is recalled and the cursormoves one position to the right. When the last command is completely displayed, pressing the Rightarrow key does not cause any cursor movement or character display.

    29910-6667-001 Revision C, February 2014

    Using CommandsKeyboard Functions

  • Left Arrow Key

    The Left arrow key moves the underline cursor one position to the left without erasing the character.The underline cursor can be moved until it reaches the first character at the left of the command. Ifthe Left arrow key is pressed again after the cursor reaches the first character of the command, thebell sounds.

    Command Output and MessagesReports and outputs generated through retrieve or report status commands are followed by a semi-colon(;) to signify the end of the output (this is in compliance with TL1 standards).

    The following types of output messages are used on the system:

    • ommand Accepted-Processing: The command has been accepted by the application’s commandhandler as syntactically correct. This message is displayed in the command area of the terminaldisplay.

    • Command Completed-The command has been entered, and the system has completed processing.This message is displayed in the scroll area of the terminal display.

    • Command Executed-The command has been entered, and the system has completed processing.This message is displayed in the command area of the terminal display.

    • Command Failed-The command was executed but failed due to an external reason, such as thelink is not equipped or a disk drive is unable to communicate. The reason for the failure is includedin this message.

    • Command Rejected-The command syntax could be incorrect, or a parameter value is incorrect(semantic error). This message is displayed in the command area of the terminal display.

    The reason for rejecting the command (command syntax or incorrect parameter value) is includedin this message.

    • Command Aborted-The command syntax and the parameter values are ok, but for some reasonthe command was aborted (for example, a disk drive is inaccessible). This message is displayed inthe scroll area of the terminal display.

    • Command Response Messages-A command is entered at the terminal, and the response to thatcommand is echoed on that same terminal. These messages are displayed in the scroll area of theterminal display.

    • Unsolicited Messages-An example of unsolicited messages are the messages delivered in responseto alarm conditions. These messages are displayed in the scroll area of the terminal display.

    The unsolicited messages can be directed to a specific terminal or printer by using the chg-trmcommand to assign one or more of the groups of unsolicited output messages shown in Table 4:Unsolicited Output Message Groups to the specified terminal or printer.

    Table 4: Unsolicited Output Message Groups

    Application SubsystemApplication Server

    ClockCard

    Global Title TranslationDebug

    Measurements MaintenanceGateway Screening

    30910-6667-001 Revision C, February 2014

    Using CommandsCommand Output and Messages

  • MPSMonitor

    SLAN MaintenanceSEAS Maintenance

    Security AdministrationSystem Maintenance

    Database AdministrationTraffic Measurements

    Program UpdateLink Maintenance

    LNP SubscriptionLNP Database Administration

    To configure a terminal to receive unsolicited LNP database administration and LNP subscriptionmessages, the LNP feature must be turned on (see the enable-ctrl-feat command).

    Command Output Banners

    When a command is executed in the system, one or more banner lines appear in the output that isdisplayed for the command.

    Figure 3: Output Banner Format

    The following fields appear in each output banner:

    • Host CLLI code—a maximum of one alphabetic character and ten alphanumeric characters. TheCLLI code uniquely identifies the system in terms of its physical location. The CLLI code must beunique among all elements in the system.

    The CLLI code contains the following information:

    • City—4 characters• State— 2 characters• Building— 2 characters• Equipment type —3 characters

    • Date—year-month-day• Time—hour: minute: second time zone• System Release Number— contains a product identifier and the version ID number.

    The product identifier, which is shown as ‘Prod’ in Figure 3: Output Banner Format and the outputexamples in this manual, can appear as “EAGLE” or “EAGLE5” depending on which product keyis turned on in the system (see the rtrv-ctrl-feat output example). If one or more “EAGLE 5"features are enabled in the system, the EAGLE5 product key must also be turned on and EAGLE5will appear in the banner. If there are no “EAGLE 5" features enabled in the system, the EAGLEproduct key will be turned on and EAGLE will appear in the banner. (If both the EAGLE5 and

    31910-6667-001 Revision C, February 2014

    Using CommandsCommand Output and Messages

  • EAGLE product keys are enabled, the EAGLE5 product key should be turned on and appear inthe banner).

    The version ID number identifies the GPL set that is specific to the software release that is expectedto be installed on the system as approved loads. The format of the version ID number ismaj.min.maint, defined as follows:

    • maj—the major release ID• min—the minor release ID• maint—the maintenance release ID

    System SecurityUser IDs and passwords protect the system from unauthorized entry into the system and enhancesystem security. To enter the system through a terminal, a user must enter a valid user ID and passwordat the system prompt, and the user ID and password must be authorized for use together. A user IDidentifies a user to the system.

    To maintain the security of the system, passwords should be changed periodically and user IDs shouldbe deleted whenever there is a personnel change.

    When prompted to enter a new password, a different password should be provided. This is theresponsibility of the user, and is not enforced by the EAGLE 5 ISS.

    Rules for User ID and Password Administration

    The rules for administering User IDs User IDs and passwords, rules for administering passwords are:

    • The maximum number of user ID-password combinations is 100.• The maximum length of the user ID is 16 characters.• The maximum length of the password is 12 characters; the minimum length is site provisionable

    using the chg-secu-dflt command, and it can be from 1 – 12 characters long.• User IDs and passwords may contain any printable characters except the characters used as

    command delimiters: colon (:), comma (,), \2yphen (-), or equal sign (=).• Each user ID must begin with an alpha character.• A password must contain:

    • At least as many characters as specified on the minlen parameter of the chg-secu-dfltcommand

    • At least as many alphabetic characters as specified on the alpha parameter of thechg-secu-dflt command

    • At least as many numeric characters as specified on the num parameter of the chg-secu-dfltcommand

    • At least as many punctuation characters as specified on the punc parameter of thechg-secu-dflt command

    • A password must not contain the associated user ID.

    Command Classes

    Each user ID and password combination is assigned to one or more command classes, configurationofconfigurationcommandsclasses, command command classes to control the set of csystem securityommands that a user may enter.

    32910-6667-001 Revision C, February 2014

    Using CommandsSystem Security

  • There are 8 unique non-configurable command classes: Basic, Database Administration, Debug, LinkMaintenance, Program Update, Security Administration, System Maintenance, and LNP Basic. (TheBasic command class is assigned to all users as a default.)

    There are 32 available configurable command classes. See the chg-cmd command description and thechg-cmdclass command description for information about naming and assigning commands toconfigurable command classes.

    See the chg-user command description or the ent-user command description for more informationon configuring user IDs and passwords and assigning command classes.

    Login Security Checks

    loginsystem security

    To aid in system security, the system maintains a record of when a password was last changed andrequires a user to change the password when it is older than the site-specified maximum passwordage. The system also keeps track of the elapsed time between successful logins. If the time betweensuccessful logins exceeds the site-specified maximum, a user is not allowed access to the system. Thesite systems administrator also has the ability to revoke a user ID.

    When a user first logs into the system, the default unauthorized user warning is displayed as follows

    NOTICE: This is a private computer system.

    Unauthorized access or use may lead to prosecution.

    Additional security is available for the system in that multiple logins using the same user ID areprohibited.

    Intrusion Alert

    To alert the system administrator to a possible attempt by an unauthorized person trying to log intothe system, the system issues a scroll area message. When 5 or more consecutive attempts to log intothe system have failed, the following scroll area message is sent to all terminal ports that can receiveunsolicited Security Administration messages:

    Info: xxxxxxxxxx successive LOGIN failures on port pp

    Where:

    • xxxxxxxxxx is the number of consecutive login failures on the port (1 – 4,294,967,295)• pp is the terminal port (1 – 40) on which the login attempts were made

    When the attempt to log into the system is successful after a series of failed consecutive login attempts,or if the active MASP reboots, the count of failed consecutive login attempts for that port is reset to 0.

    Attempts to log into the system that are not completed normally, are not considered login attemptsand are not included in the count of failed consecutive login attempts. For example, while promptingfor a password you might use the F9 key to abort the command, or errors might occur when the systemis looking up a user ID or password.

    Login Procedure

    33910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • The commands described in this manual are entered at a terminal connected to the system.

    Before you can enter most of the commands, you must enter the login command to log into thesystem and open a user session. You must enter the login command with a valid user ID and passwordcombination. When the system accepts your user ID and password as valid, you can enter commandsat the terminal in the user session.

    The first procedure in this section explains how to log into the system using the login command.

    The procedures that follow the login procedure explain how to handle common situations that canarise when you log into the system.

    • You must change the password the first time that you log in with a new user ID and password.• The user ID and password that you enter are not accepted as valid.• Your password has expired and must be changed.• Someone else has already logged on with your user ID and password; the system does not allow

    the same ID and password to be used on two terminals at the same time.

    Note: You can enter the act-user command instead of the login command.

    Log into the System for a User Session

    Your User ID and Password were not Accepted

    You Must Change Your Password

    Your Password has Expired

    Your User ID is Already Being Used

    Login Error Messages

    • E2262 Cmd Rej: Password too long, 12 maximum• E2263 Cmd Rej: Password does not contain enough characters• E2264 Cmd Rej: Password verification failed• E2750 Cmd Rej: UserID already logged on (or is logging on) another port• E2751 Cmd Rej: UserID has been revoked• E2752 Cmd Rej: UserID has become obsolete and cannot be used• E2753 Cmd Rej: Password does not contain enough alphabetic characters• E2754 Cmd Rej: Password does not contain enough numeric characters• E2755 Cmd Rej: Password does not contain enough punctuation characters• E2756 Cmd Rej: Failed reading the password table• E2757 Cmd Rej: Invalid userID/password combination• E2758 Cmd Rej: ALPHA+NUM+PUNC must not be greater than 12• E2759 Cmd Rej: Revocation of security admin userID not allowed• E2760 Cmd Rej: Failed reading the security defaults table• E2761 Cmd Rej: Password cannot contain userID

    See the chg-secu-dflt command description for information on different options the systemadministrator has for configuring the system for password requirements.

    The following is an example of the information that might be displayed in the scroll area, dependingon your site

    TM configuration:

    New password must contain

    • from 8 to 12 characters

    34910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • • at least 1 alphabetic character(s) (a - z)• at least 1 numeric character(s) (0 - 9)• at least 1 punctuation character(s) (for example, $%@#)

    Logout Procedure

    logout procedureprocedures

    When a terminal session is completed, perform the following logout procedure to log out of the systemLog Out Of the System. The terminal returns to an input idle state.

    Note: You can use the dact-user command instead of the logout command.

    Log into the System for a User Session 1. At the system prompt (>), enter the login command with your user ID.2. Press the Enter key.

    The following message appears:

    Enter Password:

    3. At the system prompt, type your password.For security reasons, the password is not displayed on the terminal screen.

    4. Press the Enter key.Follow the remaining steps to complete this procedure or to go to another procedure, \2ependingon the system response to validation of your user ID and password.

    5. If your user ID and password combination are accepted and the following messages appear in theterminal input/command response region, the terminal is available for a user session.

    Command Accepted-Processing Command Executed

    This procedure is complete.

    6. If your user ID and password combination are not accepted and the following message appears,go to ""Procedure - Your User ID and Password were not Accepted" on page 4-18.

    E2757 Cmd Rej: Invalid UserID/Password Combination

    7. If you entered a new user ID and password combination for the first time, the following messageappears, go to page 4-20.

    Enter new password (password must be changed) :

    8. If you entered your user ID and password combination and your password has expired, \2hefollowing message appears, go to 4-20.

    Enter new password (password has expired and must be changed) :

    35910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • 9. If you entered your user ID and password combination and they are already being used at anotherterminal, the following message appears. Go to 4-22.

    E2750 Cmd Rej: UserID already logged on (or is logging on) another port

    Your User ID and Password were not Accepted 1. This procedure outlines the steps to follow when you attempt to log into the system and your user

    ID and password combination are not accepted.When you entered the login command with your user ID and entered your password at thesystem prompt, the following message appeared:

    E2757 Cmd Rej: Invalid UserID/Password Combination

    When this message is displayed, the terminal also presents a message describing the login attemptand the time and date the attempt occurred.

    2. Verify that you have the correct user ID and password.

    Return to the login procedure, and log in again with the correct user ID and password.

    If the problem occurs again, contact your System Administrator.

    You Must Change Your Password 1. This situation can occur when you first log in after the system administrator uses the ent-user

    command to enter a new user ID and password combination, \2r when you first log in after thechg-user:pid=yes command has been entered.When you entered the login command with your user ID and entered your password at thesystem prompt, the following message appeared:

    Enter new password (password must be changed) :

    Type a new password, following your site guidelines.

    For security reasons, the password is not displayed on the terminal screen.

    2. Press the Enter key.The system checks the password to ensure that it meets your site’s password complexityrequirements.

    3. If your password does not meet your site's password complexity requirements, the system displaysa message based on the password violation (see 4-22 for a list of possible messages).

    The login process ends.

    Decide on a new password, and start the login procedure again.

    36910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • 4. If your password meets the complexity requirements, the following message appears:

    Verify Password:

    Type the exact password again that you entered in Step 1

    For security reasons, the password is not displayed on the terminal screen.

    5. Press the Enter key.6. If the user ID and password combination are accepted and the following messages appear in the

    terminal input/command response region, the terminal is available for a user session

    Command Accepted-Processing Command Executed

    7. Record your new password in a secure location.

    Your Password has Expired 1. When you entered the login command with your user ID and entered your password at the

    system prompt, the following message appeared:

    Enter new password (password has expired and must be changed) :

    Type a new password, following your site guidelines.

    For security reasons, the password is not displayed on the terminal screen.

    2. Press the Enter key.

    The system checks the password to ensure that it adheres to your siteTM

    s password complexityrequirements.

    3. If your password does not meet your siteTM

    s password complexity requirements, the systemdisplays a message based on the password violation (see page 4-22 for a list of possible messages).

    The login process ends.

    Decide on a new password, and start the login procedure again.

    4. If your password meets the complexity requirements, the following message appears:

    Verify Password:

    Type the exact password again that you entered in Step 1

    For security reasons, the password is not displayed on the terminal screen.

    5. Press the Enter key.

    37910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • 6. If the user ID and password combination are accepted and the following messages appear in theterminal input/command response region, the terminal is available for a user session

    Command Accepted-Processing Command Executed

    7. Record your new password in a secure location.

    Your User ID is Already Being Used 1. When you entered the login command with your user ID and entered your password at the

    system prompt, the following message appeared:

    E2750 Cmd Rej: UserID already logged on (or is logging on) another port

    The following information is displayed in the scroll area:

    Info: UID is currently logged on (or is logging on) to port yy.

    where yy is in the range of 1 - 40.

    2. Find the terminal at port yy, and log off your user ID at that workstation.

    See page 4-23.

    3. Return to your terminal and log into the system again.

    Log Out Of the System1. At the system prompt (>), enter the logout command.2. Press the Enter key.

    The following messages appear on the terminal screen to confirm command completion:

    Command Accepted-Processing Command Executed

    38910-6667-001 Revision C, February 2014

    Using CommandsLogin Procedure

  • Chapter

    3Alphabetical List of Commands

    This chapter contains an alphabetical list of theTekelec Signaling Products (Eagle, STP, IP

    7 Secure

    Gateway, and IP7 Front End) commands.

    Topics:

    • Alphabetical List of Commands.....40

    39910-6667-001 Revision C, February 2014

  • Alphabetical List of Commands

    Commands

    Aact-alm-trns

    act-cdl

    act-dlk

    act-echo

    act-file-trns

    act-flash

    act-ftp-trns

    act-gpl

    act-lbp

    act-lpo

    act-slk

    act-user

    alw-card

    alw-imt

    alw-map-ss

    alw-slk

    alw-trm

    aud-data

    Bblk-slk

    Ccanc-alm-trns

    canc-cmd

    canc-dlk

    canc-echo

    canc-lpo

    40910-6667-001 Revision C, February 2014

    Alphabetical List of CommandsCommands

  • canc-slk

    canc-user

    chg-acg-mic

    chg-acg-noc

    chg-ainpopts

    chg-aiqopts

    chg-appl-rtkey

    chg-as

    chg-assoc

    chg-atinpqopts

    chg-atm-lps

    chg-attr-seculog

    chg-card

    chg-clkopts

    chg-cmd

    chg-cmdclass

    chg-csl

    chg-ctrl-feat

    chg-db

    chg-dstn

    chg-e1

    chg-eisopts

    chg-feat

    chg-frm-pwr

    chg-ftp-serv

    chg-gpl

    chg-gsmmap-scrn

    chg-gsm-msg

    chg-gsmopts

    chg-gsmsmsopts

    chg-gsms-opcode

    chg-gta

    chg-gtcnv

    chg-gtmod

    41910-6667-001 Revision C, February 2014

    Alphabetical List of CommandsCommands

  • chg-gtt

    chg-gttact

    chg-gttapath

    chg-gttaset

    chg-gttsel

    chg-gttset

    chg-gtw-stp

    chg-gws-actset

    chg-gws-redirect

    chg-inpopts

    chg-ip-card

    chg-ip-conn

    chg-ip-lnk

    chg-is41-msg

    chg-is41opts

    chg-is41smsopts

    chg-isup-msg

    chg-l2t

    chg-l3t

    chg-lbp

    chg-lnpopts

    chg-lnp-serv

    chg-loopset

    chg-ls

    chg-lsopts

    chg-m2pa-tset

    chg-map

    chg-meas

    chg-measopts

    chg-mrn

    chg-mtc-measopts

    chg-netopts

    chg-npp-as

    chg-npp-serv

    42910-6667-001 Revision C, February 2014

    Alphabetical List of CommandsCommands

  • chg-npp-srs

    chg-pid

    chg-ppsopts

    chg-prefix

    chg-rte

    chg-rtx

    chg-sccp-msg

    chg-sccpopts

    chg-sccp-serv

    chg-scr-aftpc

    chg-scr-blkdpc

    chg-scr-blkopc

    chg-scr-cdpa

    chg-scr-cgpa

    chg-scr-destfld

    chg-scr-dpc

    chg-scr-isup

    chg-scr-opc

    chg-scrset

    chg-scr-sio

    chg-scr-tt

    chg-seas-config

    chg-secu-dflt

    chg-secu-trm

    chg-sg-opts

    chg-shlf

    chg-sid

    chg-sip-npp

    chg-sipopts

    chg-slt

    chg-snmp-host

    chg-snmpopts

    chg-srvsel

    chg-ss7opts

    43910-6667-001 Revision C, February 2014

    Alphabetical List of CommandsCommands

  • chg-ss-appl

    chg-stpopts

    chg-t1

    chg-tatr-msg

    chg-tatropts

    chg-th-alm

    chg-tifopts

    chg-trm

    chg-ttmap

    chg-ttr-msg

    chg-ttropts

    chg-uaps

    chg-user

    chg-vflx-cd

    chg-vflx-opts

    chg-vflx-rn

    chg-vflx-vmsid

    chk-unref-ent

    clr-imt-stats

    conn-imt

    copy-disk

    copy-ext-stats

    copy-fta

    copy-gpl

    copy-meas

    copy-seculog

    Ddact-alm-trns

    dact-cdl

    dact-cmd

    dact-echo

    dact-lbp

    dact-rstst

    44910-6667-001 Revision C, February 2014

    Alphabetical List of CommandsD